0% found this document useful (0 votes)
44 views26 pages

LI - API DATA BREACH Q324 Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views26 pages

LI - API DATA BREACH Q324 Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

PI S tats

A reat
h
T 3 2024
Q
(415) 940-7077
www.wallarm.com 188 King St. Unit 508, San Francisco, CA 94107
Introduction 2

Introduction
I'm pleased to present the API ThreatStatsTM Q3 2024 Report, These incidents demonstrate that API security challenges are
which explores the most significant API security threats we've pervasive and can impact any industry, underlining the urgent
observed this quarter. The Wallarm team has diligently need for robust API security measures across all sectors.


analyzed the vulnerabilities that are reshaping our digital
landscape.

Our analysis uncovered 469 API vulnerabilities this quarter—a
21% increase from the previous one. The average CVSS score
This quarter, we've witnessed major data breaches across a is 7, with many scoring 7.5, indicating high severity and
wide range of industries, highlighting how API security reflecting how easily API issues can be exploited. The majority
connects us all. Unfortunately, API vulnerabilities are not of these vulnerabilities are straightforward for attackers to
confined to any single sector—they are widespread, affecting leverage, leading to effortless data theft. The impact of these
telecommunications, blockchain, media, and public breaches depends largely on the amount and sensitivity of
transportation alike. In July 2024, Deutsche Telekom in the the data exposed, rather than the specific types of
telecommunications industry suffered authentication flaws vulnerabilities. This trend highlights an escalating threat
that exposed personal information of 252 million users. On landscape where APIs are prime targets due to their
July 30, Hotjar and Business Insider, both in the SaaS and accessibility and the valuable data they handle.
media sectors, faced cross-site issues leading to potential

Ivan Novikov
account takeovers affecting 80 million readers. Explore
Talent, another SaaS company, experienced authorization
issues on August 15, exposing 11.4 million user records. In
September, Metro Pacific Tollways Corporation (MPTC) in
public transportation faced API leaks, exposing 972,848
records, including sensitive API adjustment logs. Additionally,
in July, Fractal ID, a blockchain platform, encountered Ivan Novikov

authorization issues, compromising data of 6,300 users. CEO, Wallarm

A key discovery this quarter is the integral role of API security in AI systems. There is no AI without APIs—
they are essential in connecting models, data, and infrastructure. Vulnerabilities in APIs directly impact AI
functionalities, and AI features can introduce unique vulnerabilities into APIs. Addressing AI exploits and API
vulnerabilities together is crucial for comprehensive security, as they are deeply interconnected.

3Q
Introduction 3

To help you navigate this report, we've included a 5x5 matrix outlining the top five topics, such as data breaches and
API exploits by product categories, paired with the top five risks. The cells contain specific data breaches,
vulnerabilities, and exploits, providing a clear overview of the current security landscape and allowing you to focus on
areas most relevant to your interests.

1 2 3 4 5
API Data
Breaches Deutsche Telekom Metro Pacific
Tollways
Explore Talent Hotjar and Business
Insider
Fractal ID
Corporation (MPTC)

AI API
Vulnerabilities OpenShift AI
(CVE-2024-7557)
NVIDIA CV-CUDA
(CVE-2024-0115)
MLFlow
(CVE-2023-1177)
Deep Lake
(CVE-2024-6507)
Langflow
(CVE-2024-7297)

l u ati e
C o d-N v a hi o p Vault -
H s c r Openshift-console - e netes - Bypass
Kub r Ansible Automation Envoy - Manipulation
API l its
Exp o
Denial of Service via
Exception Handling
Unauthenticated
Helm Chart
of Mountable
Secrets Policy (CVE
Controller -
Unauthorized k8s
of x-envoy Headers
(CVE-2024-45806)
(CVE Details Installation 2023-2728 and CVE API Server Access
Unspecified) (CVE-2024-7079) 2024-3177) (CVE-2024-6840)

Cisco Application Juniper Networks' Cilium - Security FortiEDR Manager Cisco NX-OS
Cybersecurity Policy Infrastructure Junos OS - Denial- Misconfiguration in API - Improper Software - Python
Products API Controller - of-Service Attack Gateway API Access Control Parser Escape
Vulnerabilities Unauthorized Policy
Actions
(CVE-2024-39530 (CVE-2024-42487) (CVE-2024-45323) Vulnerability
(CVE-2024-20286)
(CVE-2024-20279)

Enter rise API


p SAP NetWeaver VMware vCenter ServiceNow Now Oracle Java SE and DocuSign API
l its
Exp o Application Server
(CVE-2024-39599)
Server
(CVE-2024-22274)
Platform
(CVE-2024-5178)
Oracle GraalVM
(CVE-2024-21147)
package for
Salesforce
(CVE-2024-39344)
Q3 API Data Breaches 4

Q3 API Data Breaches


Q3 2024 brought significant real-world validation to the ThreatStatsTM Top-10 approach, especially as traditional frameworks
like the OWASP API Top-10 continue to miss critical API vulnerabilities, such as API Cross-Site issues, which played a pivotal
role in several major breaches this quarter.
The incidents we’ve observed underscore that client-side API security gaps, including unauthorized access, OAuth
misconfigurations, exposed API logs, and account takeovers, are just as dangerous—if not more so—than typical API flaws like
rate limiting or injection attacks. Companies like Deutsche Telekom, Hotjar & Business Insider, Explore Talent, Metro Pacific
Tollways Corporation (MPTC), and Fractal ID experienced direct consequences from these overlooked vulnerabilities, with
breaches exposing sensitive user data, personal identifiers, and even allowing system manipulation.

252 million users Telecommunications | July 2024

Deutsche Telekom API2: Authentication Flaws

80 million readers SaaS | July 30, 2024

Hotjar & Business Insider API3: Cross-site Issues

11.4 million user records


SaaS | Au ust , 2024g 15

Explore Talent API6: Authorization Issues

Metro Pacific Tollways Corporation (MPTC) API4: API Leaks 972,848 records
Transportation | September 2024

Fractal ID API6: Authorization Issues 6300 users


Blockchain | July 2024
Q3 API Data Breaches 5
In July 2024, Deutsche Telekom experienced a significant data breach where unauthenticated API access allowed

1
attackers to retrieve personal information, tariff details, and track users through permanent identifiers. The breach

affected 252 million users, highlighting how authentication flaws in client-side APIs can lead to massive data

leakage and persistent user tracking, posing risks far beyond simple data theft.

Lesson Learned: Prioritize comprehensive discovery of the API attack surface to identify publicly accessible APIs

lacking authentication. Undocumented or forgotten APIs can become significant vulnerabilities if they are exposed

without proper security measures. Implement automated tools and continuous monitoring to detect all external-

facing APIs, ensuring that authentication and authorization are enforced universally. Recognize that traditional

security solutions like WAFs and API gateways may not protect unknown or shadow APIs, making proactive

discovery essential.

On July 30, 2024, Hotjar and Business Insider faced combined OAuth mismanagement and Cross-Site Scripting

(XSS) vulnerabilities. These cross-site issues potentially allowed attackers to take over accounts of 80 million
2 readers. The vulnerabilities in their APIs could grant unauthorized access across their platforms, illustrating how

cross-site issues can amplify the damage compared to isolated security flaws.

Lesson Learned: Acknowledge that client-side attacks targeting APIs represent blind spots for many API security

solutions. Implement robust client-side security measures, including strict Content Security Policies (CSP) and

secure handling of OAuth tokens. Regularly assess client-side applications for vulnerabilities such as Cross-Site

Scripting (XSS) and ensure that client-side code does not expose sensitive API endpoints or tokens.

In July 2024, Fractal ID, a decentralized digital identity platform, experienced a breach affecting 6,300 users due to

authorization issues stemming from an insecure API script. Sensitive personal information, including digital wallet
3 addresses and identity documents, was exposed. The incident raises concerns about API security in decentralized

platforms that heavily rely on API frameworks.

Lesson Learned: Recognize that mass assignment vulnerabilities cannot be fully mitigated by usual security
controls like negative security models or schema enforcement, especially when vulnerable fields are part of the
legitimate schema. Implement detailed validation and authorization checks for each field and action within the API.
Develop custom security measures within the application to prevent unauthorized access or modification of
sensitive data. Understand that protecting against mass assignment requires in-depth application logic that
exceeds the capabilities of standard WAFs and API gateways.

4 On August 1
5, 2024,

underscores how inade


E
q
xplore Talent exposed 11.4 million user records due to authorization issues in a misconfigured

API. Unauthorized users could access personal information like emails, names, and phone numbers. This breach

uate authorization controls in APIs can enable attackers to harvest sensitive data at scale.

Lesson Learned: Address mass assignment vulnerabilities by enforcing strict server-side authorization checks
and avoiding automatic binding of client-supplied data to internal objects. Implement explicit allowlists for fields
that can be modified by users and validate permissions for each field during API operations. Recognize that
standard security controls focusing on negative models or schema enforcement may not prevent mass
assignment if the vulnerable fields are part of the schema. Custom application logic is necessary to ensure that
only authorized data modifications are allowed.

5 In September 2024, M PTC exposed 97 2,848 records, including sensitive API adjustment logs crucial for controlling

toll road systems. The API leaks not only facilitated data theft but also posed a risk of system manipulation,

potentially disrupting critical transportation infrastructure. This incident highlights the dangers of insecure APIs in

industries reliant on operational technology.

Lesson Learned: Implement advanced API rate limiting that goes beyond traditional IP or UR -based controls. L
Utilize API keys and analyze specific JSO N fields to count and limit re q uests on a per-user or per-API key basis.

This granular approach re q uires application-aware rate limiting that standard WAFs and API gateways may not

provide. By integrating rate limiting into the application logic, organizations can prevent abuse such as automated

scraping or Denial-of-Service (DoS) attacks that exploit API endpoints.


Q3 API Data Breaches 6

Top-3 Key Insights on API Q3 Data


Breaches:

Client-Side API Vulnerabilities API Misconfigurations Amplify APIs Are a Common Weak Link
Expose Hidden Risks: Not Breach Scale: Poorly secured Across Diverse Industries:
Covered by OWASP API Top-10: APIs, especially those with weak This summer’s breaches
Many breaches this quarter, like authentication and authorization affected a wide range of
those at Hotjar, Business Insider, controls, lead to large-scale sectors, from
and Explore Talent, originated breaches because attackers can telecommunications (Deutsche
from client-side API flaws, such access and download entire Telekom) and transportation
as OAuth misconfigurations and datasets, not just isolated (Metro Pacific Tollways
Cross-Site Scripting (XSS), portions. This was evident in Corporation) to blockchain and
which are not adequately incidents at Deutsche Telekom Web3 platforms (Fractal ID).
addressed by the OWASP API and Fractal ID, where These incidents prove that no
Top-10. Developers often unauthenticated API access industry is immune, and API
mistakenly consider OAuth a allowed attackers to exploit vulnerabilities are a universal
security improvement, but when massive amounts of personal challenge across both traditional
misconfigured, it becomes a data, tariff information, and user and cutting-edge tech
critical weakness, enabling tracking. Unlike traditional landscapes. Securing APIs
account takeovers and large- malware attacks that may target requires consistent, industry-
scale data exposure. These random subsets of data, API wide efforts to address evolving
incidents reveal that client-side breaches often result in attack vectors.
API security needs more complete data extraction,
attention and a dedicated making the impact far more
approach to prevent such severe.
breaches.
Q3 API Vulnerability Statistical Analysis 7

Q3 API Vulnerability Statistical Analysis


During this quarter, the Wallarm team analyzed a total of 469 API vulnerabilities, marking a significant increase compared to
the 388 issues identified in the second quarter of 2024.

This represents a notable 21% quarter-over-quarter growth in the number of API vulnerabilities discovered.

The substantial rise highlights an escalating trend in security risks associated with APIs, which are becoming increasingly
prevalent as organizations continue to adopt cloud-native architectures and integrate open-source software into their
technology stacks.

The increase may be attributed to several factors, including the rapid expansion of API usage across various industries and the
growing complexity of modern application environments. As businesses accelerate their digital transformation efforts, APIs
serve as the backbone for enabling communication between services, which unfortunately also expands the potential attack
surface for malicious actors. Additionally, the widespread adoption of open-source components can introduce vulnerabilities if
not properly managed and secured.

The average CVSS score for Q3 API vulnerabilities is 7, high severity, and the CVSS score distribution skews towards high and
critical risk, rather than towards lower risks with a majority of issues (45%) at 7.5 score:

# of issues vs. CVSS

2.6

4.8

5.3

5.5

6.1
CVSS

7.1

7.4

7.8

8.8

s
9.1

vs
10

c
0 50 100 150 200 250

# of issues
Q3 API Vulnerability Statistical Analysis 8

The Significance of CVSS Score 7.5 in


API Vulnerabilities
A CVSS score of 7.5 is notable because it represents a vulnerability that is highly exploitable but has a moderate impact on
system components. This score is derived from a combination of exploitability and impact metrics, which, in the context of
APIs, can illuminate common weaknesses and attack vectors.

This table helps to understand CVSS 7.5 in details:

Exploitability Metrics at Their Maximum Moderate Impact Metrics

A CVSS score of 7.5 often arises when the exploitability metrics are at their highest levels.
Despite the high exploitability, the impact
In the context of APIs, this means:

metrics—Confidentiality (C), Integrity (I), and


Availability (A)—are set to Low (L) or considered
Attack Vector (AV): Network (N)
partial. This means:

The vulnerability can be exploited remotely over a network connection. Since APIs are
inherently designed to be accessed over networks, they are particularly susceptible to Confidentiality Impact

network-based attacks. An attacker does not need physical access to the system; they can The vulnerability may lead to minor data
exploit the vulnerability from anywhere with internet connectivity.

exposure. Sensitive information could be
partially disclosed, but not to a full extent that
Attack Complexity (AC): Low (L)
would compromise the entire system's
Exploitation does not require any special conditions, configurations, or advanced technical confidentiality. For example, an attacker might
skills. This low complexity makes it easier for attackers, even those with limited expertise, to access non-critical data that should not be
exploit the vulnerability. It increases the pool of potential attackers and the likelihood of the public but isn't highly sensitive.

vulnerability being exploited.

Integrity Impact

Privileges Required (PR): None (N)


There might be slight data alterations. An
Attackers do not need any authentication or prior access to the system. This means that attacker could modify some data, but the
anyone, without any legitimate credentials, can attempt to exploit the vulnerability. It changes are limited and do not corrupt critical
eliminates barriers that might otherwise prevent unauthorized access.

system data. This could involve altering user


settings or preferences without affecting core
User Interaction (UI): None (N)
functionality.

No action is required from legitimate users for the vulnerability to be exploited. The attack can
proceed without any user involvement, making it stealthy and harder to detect. Users are Availability Impact

unlikely to notice anything unusual, which delays detection and response.

The vulnerability could cause minimal service


disruptions. The system might experience
Scope (S): Unchanged (U)
slowdowns or brief periods of unavailability, but
The attack affects only the component with the vulnerability and does not impact other it doesn't lead to a complete shutdown or long-
system components. While this might seem less severe, it allows attackers to focus their term denial of service. The impact on users is
efforts on a specific target without the complexity of affecting multiple systems. noticeable but not catastrophic.

Common Types of API Vulnerabilities Scoring 7.5

Several types of vulnerabilities commonly receive a CVSS score of 7.5 in APIs, largely due to their high exploitability combined
with moderate impact. Understanding these vulnerabilities is crucial for organizations aiming to bolster their API security. These
vulnerabilities are often overlooked because they may not cause immediate critical damage, but their ease of exploitation
makes them attractive targets for attackers. Here, we delve into the most common types of these vulnerabilities, explaining how
they occur and the risks they pose.

s
Information Disclosure (API Leaks)

APIs might unintentionally expose sensitive data due to improper access controls or excessive data exposure. For instance, an API

s
endpoint could return more data than necessary, including internal identifiers or system information that could aid an attacker

v
Input Validation Flaws


c
Weak or insufficient validation allows attackers to manipulate API requests. This can lead to unintended behavior, such as
executing unauthorized operations or injecting malicious input that affects the application's logic
Untrolled Resource Consumption, Logic Bombs and Denial-of-Service (DoS)

APIs might be susceptible to resource exhaustion attacks that degrade performance. Attackers can overwhelm the API with
excessive requests, causing it to slow down or become temporarily unresponsive, affecting the user experience.
Q3 API Vulnerability Statistical Analysis 9

CWE (Common Weaknesses


Enumeration) API Insights
CWE remains the gold standard in vulnerability classification despite its inherent complexities. The structure of CWE,
characterized by its extensive tree dependencies, presents a detailed yet intricate framework for understanding
vulnerabilities. While this complexity can introduce challenges such as overlaps and other minor issues, the benefits far
outweigh these drawbacks.

This quarter, we've continued to refine our API ThreatStatsTM classification approach by grouping related CWEs into our
proprietary Top-10 categories. This classification not only highlights the most prevalent issues but also aligns with the
industry's broader efforts to standardize API security assessments. By dissecting API exploits through the lens of CWE, we
can identify recurring patterns and root causes that allow for more targeted defenses.

Wallarm ThreatStatsTM methodology aligns with the comprehensive framework established in our 2023 report, ensuring
consistency and depth in our analysis. For a detailed overview of ThreatStatsTM API Top 10 methodology, refer to our 2024
annual report.

Despite its status as the 'holy grail' of vulnerability classification, CWE is not without its challenges. These include:
Overlaps: Some CWE Tree Dependencies: The Minor Issues: These may
1 entries may describe similar
weaknesses in slightly
2 hierarchical nature of CWE
can complicate the
3 include inconsistencies in how
different organizations
different contexts or layers, classification as lower-level interpret or apply CWE
leading to potential weaknesses are nested under classifications to specific
redundancy. more generalized categories. vulnerabilities.

While this data is invaluable, it is insufficient to construct an API-specific CWE Top-25 for just one quarter. The reason lies in
the distribution of these issues across many CWE classes, with several classes having only one or two reported issues. This
scarcity makes it challenging to rank these weaknesses accurately since, technically, many would need to share the same rank
due to their limited occurrences.

Therefore, while a quarterly API CWE Top-25 is not feasible, we plan to compile and analyze the data for the entire year. The
annual 2025 API ThreatStatsTM report will include a more robust and comprehensive CWE Top-25 tailored to API-specific
vulnerabilities.

The table on page 10 illustrates how the Q3-2024 API-specific CWEs align with the global Top-25 vulnerabilities identified in
2023. This mapping provides insights into the prevalence and impact of these weaknesses in the context of APIs.

CW E
Q3 API Vulnerability Statistical Analysis 10

Q3-24 API CWE Top-10 and Mapping

to Global 2023 CWE Top-25


80% of the Q3 API CWE Top-10 mapped into CWE Top-25 2023, only CWE-200: Exposure of Sensitive Information
to an Unauthorized Actor and CWE-400: Uncontrolled Resource Consumption are not directly matched. However, we
understand that in real examples many of these cases may be mapped to CWE-20 (Improper Input Validation),
CWE-284/285/287 (improper auth/auz/access control)

40% of Q3 API CWE Top-10 are in Top-10 of CWE Top-25 2023 global. That shows relevance of the research and
wide/statistically significant presence of API issues in a subset of CVE 2023 issues, and/or their similarities to other
software bugs. The point is that APIs are just usual software with usual bugs.

Interestingly, we don't see CWE-400 Uncontrolled Resource Consumption in the CWE Top-25 list, although these bugs are
widely distributed. Their absence could be related to their relatively low risk compared to code execution vulnerabilities.

Conversely, it is interesting to see XSS/CWE-79 included in both the CWE Top-25 and the CWE API Top-10 Q3-24, despite
the web-based nature of these defects. Their inclusion is a good reminder of their role in the oAuth+XSS incidents at Hotjar
and Business Insider this quarter.

The complete CWE Top-10 for APIs is structured into three groups: AAA (Authentication, Authorization, Access Control),
Injections, and Logic Bombs. The AAA group prevails, comprising 163 issues compared to 145 for Injections, marking a 12%
predominance. Logic Bombs have emerged as a noteworthy discovery, aligning with trends highlighted in the OWASP API Top
10, which contrasts with the relative positioning of vulnerabilities like XSS in broader security analyses.
cwe #CWE CWE Top-25 Rank

1
2 CWE-284: Improper Access Control 45 13 Parent of #13 (CWE-287) and #22 (CWE-269)

Child of CWE-284 (#13 and #22)

3 CWE-285: Improper Authorization 44


22 Parent of CWE-862 (#11) and CWE-863 (#24)

4 CWE-89: Improper Neutralization of Special Elements used in an SQL


Command ('SQL Injection')
41 3

5 CWE-79: Improper Neutralization of Input During Web Page Generation


('Cross-site Scripting')
38 2

6 CWE-22: Improper Limitation of a Pathname to a Restricted Directory


('Path Traversal')
31 8

7
8 CWE-287: Improper Authentication 24 13
9 CWE-918: Server-Side Request Forgery (SSRF) 20 19
10 CWE-20: Improper Input Validation 15 6
Q3 API Vulnerability Statistical Analysis 11

API Vulnerabilities by Products,


Industries, and Deployments
Wallarm undertakes this analysis in the API ThreatStatsTM report to equip organizations with a deeper understanding of the
current API security landscape. By dissecting vulnerabilities based on products, industries, and deployment environments, we
aim to provide a granular view of where and how API vulnerabilities manifest. We hope that this chapter will be particularly
valuable as it helps organizations identify specific areas of risk relevant to their operational context.
Understanding the distribution of API vulnerabilities allows businesses to:
Tailor Security Strategies: Assess Deployment Risks: Stay Ahead of Threats:
1 By knowing which products or
industries are most affected,
2 Insights into vulnerabilities
associated with different
3 Recognizing trends in API
vulnerabilities helps in
organizations can prioritize deployment models—whether anticipating potential attacks
their security efforts where cloud-native, on-premises, or and implementing proactive
they matter most. hybrid—enable more informed measures.
decisions about infrastructure
and security investments.
Our goal with this analysis is to empower organizations to make data-driven decisions to strengthen their API security posture.
By shedding light on the specific challenges across various segments, we provide actionable intelligence that can lead to more
effective risk mitigation and resource allocation.
Let’s start with API security presence in cloud-native and legacy applications.

32.1 % Cloud native


Analysis of this quarter's API vulnerabilities reveals important trends across software types and industries. 32% of the
identified vulnerabilities are associated with cloud-native software, particularly in widely used projects such as Kubernetes,
etcd, Envoy, Argo CD, ingress-nginx, Cilium, Harbor, Contour, and the Open Policy Agent (OPA). This reflects a growing
reliance on cloud-native technologies as organizations modernize their infrastructure and adopt microservices architectures.
The complexity and rapid evolution of platforms like Kubernetes and Envoy introduce new security challenges that require

careful management.
The remaining 68% of vulnerabilities are mainly in enterprise software and APIs not specifically cloud-native. Notable examples

include Junos OS (Juniper Networks), NX-OS Software (Cisco), Application Policy Infrastructure Controller (Cisco), FortiEDR
Manager API (Fortinet), VMware vCenter Server, Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition,

SAP NetWeaver Application Server for ABAP and ABAP Platform, Now Platform (ServiceNow), Shopware, DocuSign API

package for Salesforce, IBM OpenPages, and AXIS OS (Axis Devices). These traditional enterprise applications remain
significant in the API landscape. Even though they are not cloud-native, these applications often expose APIs for integration
and functionality, making them susceptible to vulnerabilities if not properly secured. The presence of vulnerabilities in such
widely used enterprise software underscores the need for robust security measures across all types of platforms.

36.5 % open source


Open-source products are widely used, both directly by end-users and in commercial products as well. The prevalence of
open-source tools is part of the reason for the balance of issues seen in this chart. It’s important for readers to understand that
this breakdown doesn’t indicate that you should be more worried about the open-source tools you use, but more that you
should be worried about all the tools you use.
Q3 API Vulnerability Statistical Analysis 12

API Vulnerabilities by Product Category


Unknown Development framework
6.9 % 12.4 %
ML/AI software or hardware
3.2 %

DevOps tool
36.2 %

Enterprise software
39.6 %
Enterprise hardware
1.7 %

API product categories are always interesting, with Enterprise Software, DevOps Tools, and Development
Frameworks leading the majority second year each quarter. This quarter we faced 3 times fewer AI API exploits
than last quarter, which may be a result of CVE applications and assignments seasonal effect in summer.
Since enterprise software category is No 1 we decided to include an in-depth analysis, this resulted in two outcomes, a Top-5
enterprise API exploits and Top-5 API Vulnerabilities in Cybersecurity Software.
Most Risky API Exploits by Product Categories 13

Top-5 AI API Vulnerabilities of Q3-24


AI systems are fundamentally reliant on APIs to function, connecting models, data, and infrastructure. Without APIs, AI
products would lack the connectivity and integration that drive their capabilities. This section, however, focuses on API
exploits affecting AI products, not AI vulnerabilities in general, nor all APIs that may interact with AI. The following are the
top API exploits found in AI products during Q3-24, with detailed technical insights and lessons learned.

These top API exploits in AI products from Q3-24 demonstrate the growing importance of securing APIs within AI
ecosystems. Each exploit highlights a unique challenge in API security, from privilege management to resource handling

and input validation.


OpenShift AI (CVE-2024-7557) – Authentication Bypass & Privilege
1 Escalation
A critical vulnerability in OpenShift AI’s odh-model-controller enables an authentication bypass across
models in the same namespace. This allows unauthorized users to escalate privileges, gaining access
to other models and resources. Such breaches pose significant risks, as compromised models could
expose sensitive data or maliciously interact with other components within the environment.
Lesson Learned: Always ensure that authentication mechanisms are compartmentalized between
different models or services, especially in multi-tenant environments. Strong namespace isolation is
crucial to prevent privilege escalation.

NVIDIA CV-CUDA (CVE-2024-0115) – Uncontrolled Resource


2 Consumption
NVIDIA’s CV-CUDA Python APIs suffer from a vulnerability that leads to uncontrolled resource
consumption, causing potential denial of service (DoS) and data loss. This exploit stems from poorly
managed API resource handling, which allows attackers to overwhelm the system's computational
resources, effectively rendering services unusable.
Lesson Learned: Proper resource management and limitations must be enforced at the API level,
particularly in performance-heavy environments like AI. Implementing rate-limiting and resource
control mechanisms can prevent DoS attacks.

MLFlow (CVE-2023-1177) – Path Traversal Vulnerability


3 A path traversal vulnerability in MLFlow allows attackers to access sensitive files on the host server
through API calls. This exploit could lead to the exposure of configuration files, API keys, or other
critical data that should remain inaccessible to external users.
Lesson Learned: Input validation is critical to prevent path traversal. API endpoints that interact with
file paths must rigorously sanitize inputs and restrict access to known, secure directories to mitigate
such risks.

p 5 a i
Most Risky API Exploits by Product Categories 14

Deep Lake (CVE-2024-6507) – Command Injection Vulnerability


4 The command injection flaw in Deep Lake, stemming from unsafe consumption of user inputs via
APIs, allows attackers to execute arbitrary commands on the server. This can lead to data breaches,
unauthorized access, and full system compromise if exploited.

Lesson Learned: Never trust user inputs in API calls that invoke system commands. Always sanitize
and validate inputs, and use parameterized queries or safe execution functions to avoid command
injection vulnerabilities.

Langflow (CVE-2024-7297) – Privilege Escalation


5 Langflow’s API suffers from a critical privilege escalation flaw where an attacker can send a single
request to obtain super admin rights. This type of vulnerability presents a significant security threat,
as attackers can completely control the system with minimal effort.

Lesson Learned: Implement strict privilege checks at every API endpoint, especially for sensitive
operations. Proper role-based access control (RBAC) and multi-factor authentication should be
enforced to prevent unauthorized privilege escalations.

op5pa5i
Most Risky API Exploits by Product Categories 15

Top-5 Enterprise API Exploits of Q3-24


Our list of API threats is meticulously curated based on their potential to disrupt operations, compromise data, and the
critical nature of the systems they impact, as well as their attractiveness to cyber attackers. The purpose of this
ranking is to direct enterprise attention towards the most severe vulnerabilities that demand comprehensive and
immediate defensive strategies.
SAP NetWeaver Application Server (CVE-2024-39599)
1 This vulnerability stands out due to its ability to bypass the malware scanner, posing a severe risk

in environments where SAP NetWeaver underpins a variety of essential business processes. A single
exploit could lead to substantial data breaches, operational disruptions, and financial losses.
Lesson Learned: The importance of implementing layered security measures such as meticulous
code review processes, enhanced API endpoint protection, and the integration of advanced
automated security scanning technologies cannot be overstated. These steps are critical in
identifying and mitigating such threats before they can be exploited.

VMware vCenter Server (CVE-2024-22274)


2 This critical vulnerability can lead to command injection, privilege escalation, and ultimately,
unauthorized remote code execution. Given VMware's central role in managing virtualized
environments, the potential for widespread disruption is significant, possibly impacting entire

data centers.
Lesson Learned: Regularly updating software and maintaining strict user access controls are
crucial. Additionally, deploying sophisticated monitoring tools and developing rapid incident response
protocols are vital to detect and respond to incidents promptly, preventing attackers from exploiting
such vulnerabilities.

ServiceNow Now Platform (CVE-2024-5178)


3 A sensitive file read flaw in this widely utilized IT service management platform can allow
unauthorized users to access critical business information. The exposure of such information

not only compromises organizational security but also poses a risk to business integrity.
Lesson Learned: Strengthening access controls and implementing more robust authentication
mechanisms are essential to safeguard sensitive files. Regular audits and enhancements to API
security policies can further protect against such vulnerabilities, ensuring that confidential data
remains secure.

o p 5
r i s e
t rp
Most Risky API Exploits by Product Categories 16

Oracle Java SE and Oracle GraalVM (CVE-2024-21147)


4 The pervasive nature of Java in enterprise applications makes this vulnerability particularly
concerning. Unauthorized data access through compromised APIs can lead to serious data
breaches, affecting multiple dependent systems.

Lesson Learned: Enterprises should prioritize frequent security updates and rigorously apply a
default-deny framework for all application interactions. Employing application behavior analysis

and stringent access controls can mitigate the risk of unauthorized access and ensure data integrity
across the board.

DocuSign API package for Salesforce (CVE-2024-39344)


5 This API flaw, which could lead to complete account compromise, ranks on this list due to the
sensitive nature of the documents and data it handles within Salesforce. The breach potential

here carries not only data loss risks but also severe legal implications and trust erosion.

Lesson Learned: Regular security evaluations and robust integration practices are key to securing
APIs. Enterprises should also focus on the continuous monitoring and auditing of third-party
integrations to detect and rectify any security lapses promptly.

We hope that by absorbing these lessons and addressing the highlighted threats, businesses can enhance their API security
posture, secure the core systems that underpin their operations from the dynamic threats in today's API environment.

op 5ri
5
e
t ps
o rp
Most Risky API Exploits by Product Categories 17

Top-5 API Vulnerabilities in


Cybersecurity Software of Q3-24
This detailed chapter dives into the most critical API vulnerabilities recently unearthed in major cybersecurity software
systems. Each vulnerability acts as a potential front door for attackers, turning what should be robust defense mechanisms
into inadvertent entry points. Dive into this section to understand how these API issues may be unwittingly inviting attackers
into your digital domain and learn strategies to fortify your defenses effectively.

SAP NetWeaver Application Server (CVE-2024-39599)


1 This vulnerability stands out due to its ability to bypass the malware scanner, posing a severe risk in
environments where SAP NetWeaver underpins a variety of essential business processes. A single
exploit could lead to substantial data breaches, operational disruptions, and financial losses.
Lesson Learned: The importance of implementing layered security measures such as meticulous
code review processes, enhanced API endpoint protection, and the integration of advanced
automated security scanning technologies cannot be overstated. These steps are critical in
identifying and mitigating such threats before they can be exploited.

VMware vCenter Server (CVE-2024-22274)


2 This critical vulnerability can lead to command injection, privilege escalation, and ultimately,
unauthorized remote code execution. Given VMware's central role in managing virtualized
environments, the potential for widespread disruption is significant, possibly impacting entire data
centers.
Lesson Learned: Regularly updating software and maintaining strict user access controls are
crucial. Additionally, deploying sophisticated monitoring tools and developing rapid incident response
protocols are vital to detect and respond to incidents promptly, preventing attackers from exploiting
such vulnerabilities.

Cilium - Security Misconfiguration in Gateway API


3 (CVE-2024-42487)
This vulnerability arises from a misconfiguration in the Gateway API HTTPRoutes and GRPCRoutes
within Cilium, a key component in networking, observability, and security solutions utilized across
numerous API security products. The flaw can lead to unexpected and potentially hazardous security
behaviors.
Lesson Learned: Adherence to API specifications and thorough configuration checks

are essential to prevent such issues. Organizations should conduct detailed

security assessments and configuration audits regularly to ensure

alignment with security best practices and standards,

thereby mitigating the risk of misconfiguration.

p 5 c u r
o
t ers e
Most Risky API Exploits by Product Categories 18

FortiEDR Manager API - Improper Access Control


4 (CVE-2024-45323)
This critical vulnerability exposes sensitive backend logs due to insufficient access controls, risking
significant data exposure. The incident underscores the importance of securing API endpoints
against unauthorized access.

Lesson Learned: Strengthening API security with robust access management systems is crucial.
Implementing layered security strategies, such as role-based access control (RBAC) and continuous
monitoring of API access patterns, can prevent unauthorized access and secure sensitive data
effectively.

Cisco NX-OS Software - Python Parser Escape Vulnerability


5 (CVE-2024-20286)
This issue allows attackers to escape the Python sandbox environment and gain unauthorized
access to the system's underlying operations. This vulnerability is particularly concerning due to its
potential to compromise system integrity.

Lesson Learned: Ensuring rigorous input validation and secure configuration of all software
components are vital. Organizations should employ sandboxing techniques judiciously,
complemented by strict security measures and regular security audits to detect and rectify such
vulnerabilities promptly.

t o p 5

o p5e cu
rs
Most Risky API Exploits by Product Categories 19

Top-5 Cloud-Native API


Exploits for Q3-24
The landscape of cloud-native technologies is continually evolving, and with it, the complexity of security challenges.
This list of the top-five exploits in Q3-24 highlights significant vulnerabilities that have been identified across various
platforms, underscoring the critical need for vigilant security practices and timely updates.

Hashicorp Vault - Denial of Service via Exception Handling (CVE


1 Details Unspecified)
A high-risk vulnerability in Hashicorp Vault arises from improper handling of exceptional conditions,
leading to potential denial of service. This issue was addressed in Vault and Vault Enterprise versions
1.17.2 and 1.16.6, reminding users of the necessity to maintain updated systems.
Lesson Learned: Implementing robust error handling and validating all operational exceptions are
crucial to prevent service disruptions in critical security tools.

Openshift-console - Unauthenticated Helm Chart Installation


2 (CVE-2024-7079)
This vulnerability allows unauthenticated users to install helm charts on Openshift-console, posing a
significant risk of unauthorized changes and potential breaches.
Lesson Learned: Strict authentication controls and rigorous permission checks should be enforced
to restrict access to deployment configurations and maintain the integrity of container orchestration
environments.

Kubernetes - Bypass of Mountable Secrets Policy (CVE 2023-2728

3 and CVE 2024-3177)


Kubernetes faced a severe security flaw where an exploit bypassed the mountable secrets policy
imposed by the ServiceAccount admission plugin. This vulnerability could lead to unauthorized
access to sensitive data.
Lesson Learned: Regular updates and patches are essential, along with a comprehensive review of
access policies and plugins to ensure they function as intended to safeguard sensitive information.

o
t dp 5
nat i
Most Risky API Exploits by Product Categories 20

Ansible Automation Controller - Unauthorized k8s API Server


4 Access (CVE-2024-6840)
This exploit in the Ansible Automation Controller allows attackers to gain access to the Kubernetes
API server through job execution with a container group, potentially leading to widespread system
manipulation.

Lesson Learned: It’s critical to monitor and control the execution paths that lead to critical API
endpoints, ensuring that all access is authenticated and authorized to prevent misuse.

Envoy - Manipulation of x-envoy Headers (CVE-2024-45806)


5 Envoy - Manipulation of x-envoy Headers (CVE-2024-45806): A vulnerability in Envoy allows
the potential manipulation of x-envoy headers from external sources, which could be exploited to
misroute traffic or disrupt service operations.

Lesson Learned: Input validation and security hardening of headers are necessary to protect
against manipulations that could compromise the traffic management within microservices
architectures.

t opd np
o a5 5 t i
K I
ey nsights for Q3 2024 21

Key Insights for Q3 2024


#1 The Increasing Security Risk of eBPF
The third quarter of 2024 has brought to light a series of significant API vulnerabilities in Cilium, a cornerstone in the
implementation of eBPF (extended Berkeley Packet Filter) technology. Cilium is widely employed for networking, observability,
and security across Kubernetes environments, which means these vulnerabilities have far-reaching implications. This chapter
details four major issues identified within Cilium’s API, underscoring an emerging pattern of critical security risks associated with
eBPF technologies.
Authentication Bypass (CVE-2024-42487): A A Concerning Indicator for eBPF
misconfiguration in the Gateway API’s HTTPRoutes and These vulnerabilities within Cilium, a key eBPF-based
GRPCRoutes within Cilium v1.15 and v1.16 has led to a solution, illustrate a troubling trend in the security of cloud-
route matching order that contradicts specifications, native technologies. eBPF’s ability to run programs in the
potentially allowing unauthorized access. This Linux kernel space from user space provides powerful
vulnerability underscores the necessity of precise API capabilities for performance monitoring and network traffic
security configurations to prevent authentication control. However, this also introduces a critical risk factor:
bypasses kernel-level access can potentially be exploited by attackers
Information Leakage via Gateway API to gain unprecedented control over systems.
(CVE-2024-42486): This issue involves incorrect
update logic in the ReferenceGrant component of A ider rend of eBPF Fai re
W T lu s

Cilium’s Gateway API, which could inadvertently extend These issues are part of a broader concern highlighted by

the accessibility of sensitive information beyond recent events involving CrowdStrike’s Falcon Sensor, which

intended limits. Patched versions v1.15.8 and v1.16.1 caused kernel panics and crashes on Linux systems due to

address this flaw, highlighting the importance of timely a kernel bug linked to BPF usage. The incident, which led to

updates in maintaining security integrity widespread disruptions across various platforms,

underscores the potential dangers of eBPF at a kernel level,


Extended Access to Secrets (CWE-200): A similar given its capacity to execute code with high privileges
vulnerability to CVE-2024-42486, this flaw also stems directly from user space.

from faulty ReferenceGrant update logic in the


GatewayAPI controller. The delay in propagating The nature of these exploits indicates that we may see more

changes allows Gateway resources to access secrets issues arising in the near future. The impact of such

across namespaces even after permissions are revoked, vulnerabilities is particularly severe due to the kernel-level

posing a serious risk of information exposure access eBPF provides. This makes every discovered

vulnerability not just a flaw, but a substantial potential

Denial of Service (DoS) Vulnerability: An improper backdoor into enterprise systems.

handling of exceptional conditions within Cilium can


trigger a denial of service. This vulnerability, fixed in later
As eBPF continues to be adopted widely, particularly in

releases, serves as a reminder of how seemingly minor


environments that require robust security measures like

oversights in handling exceptional network conditions


financial services and critical infrastructure, the need for

can lead to significant disruptions


stringent security audits and rapid response mechanisms

becomes increasingly imperative.


Key Insights for Q3 2024 22

Key Insights for Q3 2024


#2 Client-Side API
Vulnerabilities on the Rise
Cross-Site Scripting (XSS) also marked its presence strongly
in Q3-24, ranking as the fifth most common issue among the
Top-15 CWEs with 15 instances out of 469 API vulnerabilities.
Holding the second position in MITRE's CWE Top-25 globally,
Client-side API vulnerabilities remain a significant, yet often the pervasiveness of XSS, especially in APIs interacting with
underestimated, threat in the landscape of API security. This web browsers or mobile devices (uXSS), calls for stringent
quarter, high-profile data breaches at organizations like client-side security measures.

Hotjar, Business Insider, and Explore Talent put a spotlight on


these issues. Driven primarily by client-side API flaws such as Beyond XSS, the landscape is riddled with other client-side
OAuth misconfigurations and Cross-Site Scripting (XSS), issues like OAuth hijacking and API token theft, which often
these breaches reveal hidden risks that traditional security escape notice due to their exclusion from the OWASP API
assessments like the OWASP API Top-10 fail to fully address. Top-10. This oversight leads to a dangerous gap in security
practices as these vulnerabilities demand specific strategies
for mitigation, given their impact on client interaction.

The focus of the current OWASP API Top-10 does not fully
capture the extent of client-side API vulnerabilities, especially
those exploiting the complex interactions between users,
OAuth, and other authentication mechanisms. This gap
OAuth, generally viewed as a security enhancer, can indicates a need for developers and security professionals to
transform into a major vulnerability when improperly expand their understanding and approach to API security,
configured. Such misconfigurations can lead to unauthorized ensuring comprehensive protection that includes both server-
access, extensive data exposures, and complete account side and client-side vulnerabilities.

takeovers, showcasing a gap in security practices and


awareness among developers regarding API implementations. With the rise of client-side API vulnerabilities highlighted in
Q3-24, it's clear that a holistic approach to API security,
involving diligent configuration, regular audits, and proactive
management of emerging vulnerabilities, is crucial to fend off
the sophisticated nature of modern cyber threats.

I
Key Insights for Q3 2024 23

Key Insights for Q3 2024


#3 AI Security is API security
In the world of artificial intelligence (AI), APIs are not just a component; they are fundamental. Every AI product is built
around APIs that manage data inputs and outputs, meaning there is no AI without API. However, with the pervasive
integration of APIs in AI products, vulnerabilities in API security directly impact the security of AI systems. This
relationship also works in reverse, as AI functionalities can introduce unique vulnerabilities into the APIs themselves.
For instance, an enterprise using OpenShift AI could leverage
it for automating and scaling machine learning workflows
across various departments. However, if the API managing
these workflows is compromised, as indicated by
CVE-2024-7557 which allows for authentication bypass,
the consequences could extend across the entire business,
impacting everything from automated decision-making to
CVE-2024-7557 data privacy.
The intertwining of AI and API security suggests that vulnerabilities in one can significantly impact the other. Enhancing API
security can lead to more robust AI systems, and vice versa. For instance, improving input validation and sanitation to combat
injection attacks will protect both traditional data processing APIs and those used in AI for data analysis and decision-making.
To show this overlaps, we prepared a list of common AI API issues discovered in Q3-2024:
Key Insights for Q3 2024 24

API Vulnerabilities in AI
Systems of Q3-24

1
Injection Vulnerabilities: AI systems are often susceptible to various forms of injection attacks due to their
reliance on extensive data input and outputs. For instance, vulnerabilities like SQL Injection can appear in AI
tools that interact with databases via APIs, as seen in tools like KubeClarity and Meshery. These flaws can lead
to unauthorized data manipulation and breaches, illustrating critical points where AI functionalities intersect
with traditional API vulnerabilities.

2
Authentication and Access Control Flaws: Authentication bypass is a common issue that affects both AI
and non-AI systems alike. In AI-centric products, such as OpenShift AI and Flowise, these vulnerabilities allow
attackers to escalate privileges or perform unauthorized actions across different parts of the AI ecosystem.
These incidents underscore the need for stringent authentication mechanisms in APIs that control access to AI
functionalities.

3
Configuration and Cryptographic Failures: Hard-coded cryptographic keys in systems like Dragonfly
demonstrate a significant risk in API security that directly affects the security of AI products. Such
misconfigurations can lead to authentication bypasses, giving attackers administrative access and potentially
compromising the entire AI system.

4
Client-Side API Vulnerabilities: While traditionally associated with web applications, client-side API
vulnerabilities also impact AI products that interact with client-side technologies. OAuth misconfigurations
and Cross-Site Scripting (XSS) vulnerabilities can lead to data breaches in AI systems that offer user-facing
functionalities, highlighting the overlapping concerns between API security and AI application security.

Limitations of OWASP LLM in AI API Context


It is important to note that while the OWASP Large Language Models (LLM) provide guidelines that are
critical for securing systems, they are not entirely applicable to AI APIs, which require a more focused
approach. The OWASP LLM guidelines cover a broader spectrum of large language model concerns and
do not specifically address the intricate API issues seen in AI implementations. However, the overlap
between OWASP LLM and AI API vulnerabilities confirms the integrated nature of AI and API security. This
integration indicates that both areas can benefit from shared security practices, although specific
adjustments and enhancements are necessary to address the unique challenges presented by AI APIs.

As Wallarm continues to track vulnerabilities, it's clear that AI and API security must be viewed as a unified challenge. Every AI
system relies on APIs to function, making them inseparable in both their operation and potential risks. The vulnerabilities we
observe in APIs directly affect the security and integrity of AI systems, and AI-specific functionalities can introduce unique risks
to the APIs they rely on. By addressing them together, enterprises ensure a more comprehensive approach to securing the
future of AI-driven technologies. AI exploits and API vulnerabilities are not separate issues—they are one and the same, and
need to be treated as such.
Action Items 25

Action Items for CISOs, API Architects,


and Security Practitioners
Why We Are Doing It This Way
In our last Q2-24 report, we provided action items specifically for CISOs and Security Practitioners. However, we've received
feedback requesting guidance tailored to API Architects as well. Recognizing the critical role API Architects play in designing
and securing APIs, we've expanded this final section to include them. By referencing real cases and incidents from this report,
including specific CVEs, we aim to provide each role with practical, actionable steps to address the API security challenges
highlighted in our findings.

CISOs: Strategic Leadership


API Architects: Designing Security Practitioners: Tactical
in API Security Secure and Resilient APIs Measures for API Protection
Prioritize Comprehensive API Ensure Robust Authentication Conduct Regular, Comprehensive
Discovery and Authentication Across All APIs Security Assessments
Controls Case Reference: Deutsche Telekom's massive Case References: Multiple breaches occurred
Case Reference: Deutsche Telekom's breach data breach due to unauthenticated API due to overlooked vulnerabilities across
in July 2024 exposed 252 million users due to access. industries.
unauthenticated API access.

Action Item: Design APIs with strong Action Item: Schedule regular security
authentication protocols, correctly assessments, including penetration testing and
Action Item: Deploy organization-wide API implementing standards like OAuth 2.0. Avoid code reviews, focusing on both server-side
discovery tools to identify all public-facing deploying APIs without authentication, even for and client-side APIs. Use specialized tools to
APIs, including undocumented or shadow APIs. internal services, to prevent unauthorized detect vulnerabilities like mass assignment,
Ensure that every API endpoint requires robust access similar to the Deutsche Telekom injection flaws, and authentication bypasses.
authentication mechanisms to prevent incident.
unauthorized access, mitigating risks like those Monitor and Secure Client-Side
seen in the Deutsche Telekom incident. Implement Detailed Input Applications
Address Client-Side API Validation and Output Encoding Case Reference: Hotjar and Business Insider's
Vulnerabilities Proactively Case Reference: Hotjar and Business Insider client-side vulnerabilities led to significant
suffered from XSS vulnerabilities leading to account takeovers.
Case Reference: Hotjar and Business Insider account takeovers.
faced account takeovers affecting 80 million Action Item: Extend your security measures to
readers due to OAuth misconfigurations and Action Item: Apply rigorous input validation client-side applications. Implement Content
Cross-Site Scripting (XSS) vulnerabilities and output encoding on all API endpoints to Security Policies (CSP) and ensure secure
(CVE-2024-XXXX).

prevent injection attacks, including XSS. handling of tokens and sensitive data on the
Ensure that both server-side and client-side client side to prevent attacks that bypass
Action Item: Expand your security strategy to validations are in place to protect against server-side defenses.
include client-side API vulnerabilities. Invest in malicious inputs.
training for your teams on securing OAuth
implementations and preventing XSS attacks.
Implement policies that require regular
assessments of client-side applications to
uncover vulnerabilities that traditional server-
side security measures might miss.
Action Items 26

Enhance Authorization Checks to Prevent Mass Assignment Enhance Logging and Anomaly
Prevent Mass Assignment Vulnerabilities Detection or APIs f

Case References: Explore Talent exposed 11.4 Case References: Explore Talent's exposure Case Reference: MPTC's lack of monitoring

million user records due to authorization issues of user records due to authorization flaws.
allowed for unnoticed data exfiltration.

on August 15, 2024.


Fractal ID's data compromise from mass A tio It m I p p h v
Fractal ID compromised data of 6,300 users in
c n e : m lement com re ensi e
assignment issues. AI v U y
July 2024 because of authorization flaws.
logging of all P acti ities. se anomal

Action Item: Avoid automatic binding of client- y


detection s y p
stems to identif unusual atterns ,
Action Item: Mandate strict server-side supplied data to internal objects. Explicitly such p as s yp
ikes in traffic or at ical access

authorization checks for all APIs. Ensure define which fields are allowed to be modified times, b ena p p
ling swift res onse to otential

developers avoid mass assignment by users and enforce strict authorization h


t reats.

vulnerabilities by explicitly defining permissible checks for each field and operation within your
fields for user modification and validating user APIs. Apply Application-Aware Rate
permissions for each API operation. Limiting and Access Controls
Design Application-Level Rate
Implement Advanced, Application- Limiting Mechanisms Case Reference: Exploitation of APIs without
Aware Rate Limiting effective rate limiting, as seen in several
Case Reference: MPTC's API leaks due to breaches this quarter.
Case Reference: Metro Pacific Tollways inadequate rate limiting controls. Action Item: Collaborate with API architects to
Corporation (MPTC) exposed 972,848 records Action Item: Incorporate rate limiting within implement rate limiting based on API keys and
due to API leaks in September 2024. the application logic of your APIs. Use API keys user behavior. Ensure that access controls are
Action Item: Develop rate limiting strategies and user identifiers to monitor and control the fine-tuned to prevent excessive requests and
that go beyond traditional IP-based controls. rate of requests, focusing on user behavior and potential abuse.
Utilize API keys and monitor specific user specific API actions rather than just IP
behaviors and data patterns within JSON addresses. Stay Informed on Emerging
payloads to apply granular rate limiting. This Threats and CVEs
approach helps prevent automated attacks Integrate Security into AI API Case References: OpenShift AI's vulnerability
and abuse that exploit API endpoints, as seen Development (CVE-2024-7557).

in the MPTC incident.


Case Reference: OpenShift AI's NVIDIA CV-CUDA's uncontrolled resource
Integrate AI and API Security authentication bypass vulnerability consumption (CVE-2024-0115).
Strategies
(CVE-2024-7557) leading to potential privilege
Action Item: Regularly update your knowledge
Key Insight: AI security is intrinsically linked to
escalation.
base with the latest API vulnerabilities and
Action Item: When developing APIs for AI CVEs. Subscribe to security advisories and
API security; vulnerabilities in APIs directly systems, embed security practices such as participate in professional networks to stay
impact AI functionalities. strict authentication, authorization, and input ahead of emerging threats relevant to your
Action Item: Ensure your security policies validation. Ensure that AI models and data are organization's APIs.
encompass both AI systems and their protected against unauthorized access and

underlying APIs. Address vulnerabilities such manipulation.

as authentication bypasses and injection


attacks in AI-related APIs—for example, the
OpenShift AI vulnerability (CVE-2024-7557).
Promote collaboration between AI
development teams and security teams to
build security into AI projects from the ground
up.

By focusing on these actionable steps, each role can address the specific challenges highlighted by the real cases and CVEs in
this report. The pervasive API vulnerabilities we've identified this quarter demonstrate the critical need for coordinated efforts
across all levels of your organization. Together, we can enhance our collective security posture and better protect our
interconnected digital landscape.
As we continue to monitor and analyze API security threats, we invite you to follow us on LinkedIn to stay informed about our
latest insights and updates. Don't miss our upcoming Annual 2024 API ThreatStatsTM Report, where we'll delve deeper into the
trends and findings shaping the future of API security.

Thank you for your commitment to


cybersecurity and for trusting Wallarm

You might also like